Skip to main content

Efficient Attribute Authentication in Wireless Mobile Networks

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4331))

Abstract

Recent e-commerce requires an attribute authentication that provides users with distinctive and unique internet service, as well as user identification. Despite widespread awareness of the importance of attribute authentication, the attribute authentication service is not yet used widely due to it’s inconvenience and inefficiency. These defects especially has a bad effect to mobile users in wireless networks. This paper described the weakness of current attribute authentication mechanisms and proposed a Public Key Certificate(PKC)-based attribute authentication model considering an efficiency and convenience. The user who has a PKC in a mobile device can use the efficient attribute authentication without additional procedure.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ECOM(Next Generation Electronic Commerce Promotion Council of Japan),Attribute Authentication Handbook (2005), http://www.ecom.jp

  2. Housley, R., et al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC3280, IETF (April 2002)

    Google Scholar 

  3. Farrel, S., et al.: An Internet Attribute Certificate Profile for Authorization, RFC3281, IETF (April 2002)

    Google Scholar 

  4. Oppliger, R., et al.: Using Attribute Certificates to Implement Role Based Authorization and Access Control Models, In: SIS 2000, (October 2000)

    Google Scholar 

  5. Kambourakis, G., et al.: Introducing Attribute Certificates to Secure Distributed E-learning or M-learning Serivces. In: WEB 2004 (February 2004)

    Google Scholar 

  6. ITU-T Recommendation X.509 (1997) | ISO/IEC 9594-8:1998, Information technology - Open Systems Interconnection - The Directory : Authentication Framework (1998)

    Google Scholar 

  7. Myers, M., et al.: Internet X.509 Public Key Infrastructure Online Certificate Status Protocol-OCSP, RFC2560, IETF (June 1999)

    Google Scholar 

  8. Jakobsson, M.: Efficient Attribute Authentication with Applications to AdHoc Networks. ACM Press, New York (2004)

    Google Scholar 

  9. ISO/TS, Health Informatics-Public Key Infrastructure - Part2 : Certificate Profile, ISO/TS 17090-2 (2002)

    Google Scholar 

  10. ECOM(Next Generation Electronic Commerce Promotion Council of Japan), Handbook of Attribute (2005), http://www.ecom.jp

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Lee, J., Jeun, I., lee, S. (2006). Efficient Attribute Authentication in Wireless Mobile Networks. In: Min, G., Di Martino, B., Yang, L.T., Guo, M., Rünger, G. (eds) Frontiers of High Performance Computing and Networking – ISPA 2006 Workshops. ISPA 2006. Lecture Notes in Computer Science, vol 4331. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11942634_111

Download citation

  • DOI: https://doi.org/10.1007/11942634_111

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-49860-5

  • Online ISBN: 978-3-540-49862-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics